Compare commits

..

1 Commits

Author SHA1 Message Date
Gitea Actions Bot
ec8e718465 Auto-update README with current k8s applications
All checks were successful
Terraform / Terraform (pull_request) Successful in 33s
Generated by CI/CD workflow on 2025-12-23 01:08:05

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2025-12-23 01:08:05 +00:00
17 changed files with 4 additions and 450 deletions

View File

@@ -49,14 +49,14 @@ spec:
cpu: "1000m"
livenessProbe:
httpGet:
path: /
path: /health
port: 8081
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /
path: /health
port: 8081
initialDelaySeconds: 10
periodSeconds: 5

View File

@@ -1,31 +0,0 @@
---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: mmdl-secrets
spec:
target:
name: mmdl-secrets
deletionPolicy: Delete
template:
type: Opaque
data:
DB_DIALECT: 'postgres'
DB_HOST: psql.psql.svc
DB_USER: mmdl
DB_NAME: mmdl
DB_PORT: "5432"
DB_PASS: |-
{{ .pg_pass }}
AES_PASSWORD: |-
{{ .pg_pass }}
data:
- secretKey: pg_pass
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[12].value

View File

@@ -13,13 +13,6 @@ spec:
- host: cal.hexor.cy
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: mmdl
port:
number: 3000
- path: /dav
pathType: Prefix
backend:

View File

@@ -2,10 +2,9 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- app.yaml
- deployment.yaml
- service.yaml
- mmdl-deployment.yaml
- mmdl-service.yaml
- ingress.yaml
- external-secrets.yaml

View File

@@ -1,61 +0,0 @@
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: mmdl
labels:
app: mmdl
spec:
selector:
matchLabels:
app: mmdl
replicas: 1
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 0
template:
metadata:
labels:
app: mmdl
spec:
nodeSelector:
kubernetes.io/hostname: master.tail2fe2d.ts.net
containers:
- name: mmdl
image: intriin/mmdl:latest
imagePullPolicy: Always
envFrom:
- secretRef:
name: mmdl-secrets
env:
- name: NEXTAUTH_URL
value: "https://cal.hexor.cy"
- name: CALDAV_SERVER_URL
value: "https://cal.hexor.cy/dav"
resources:
requests:
memory: "128Mi"
cpu: "100m"
limits:
memory: "512Mi"
cpu: "1000m"
livenessProbe:
httpGet:
path: /
port: 3000
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /
port: 3000
initialDelaySeconds: 10
periodSeconds: 5
timeoutSeconds: 3
ports:
- name: http
containerPort: 3000
protocol: TCP

View File

@@ -1,14 +0,0 @@
---
apiVersion: v1
kind: Service
metadata:
name: mmdl
spec:
selector:
app: mmdl
type: ClusterIP
ports:
- name: http
port: 3000
protocol: TCP
targetPort: 3000

View File

@@ -47,20 +47,3 @@ spec:
server: https://kubernetes.default.svc
sourceRepos:
- ssh://git@gt.hexor.cy:30022/ab/homelab.git
---
apiVersion: argoproj.io/v1alpha1
kind: AppProject
metadata:
name: desktop
namespace: argocd
spec:
clusterResourceWhitelist:
- group: '*'
kind: '*'
description: Hexor Home Lab Desktop Apps
destinations:
- namespace: '*'
server: https://kubernetes.default.svc
sourceRepos:
- ssh://git@gt.hexor.cy:30022/ab/homelab.git

View File

@@ -123,8 +123,6 @@ spec:
{{ .remnawave }}
USER_umami: |-
{{ .umami }}
USER_mmdl: |-
{{ .mmdl }}
data:
- secretKey: authentik
sourceRef:
@@ -247,14 +245,3 @@ spec:
metadataPolicy: None
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[11].value
- secretKey: mmdl
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[12].value

View File

@@ -1,21 +0,0 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: jellyfin-uk
namespace: argocd
spec:
project: apps
destination:
namespace: jellyfin
server: https://kubernetes.default.svc
source:
repoURL: ssh://git@gt.hexor.cy:30022/ab/homelab.git
targetRevision: HEAD
path: k8s/desktop/jellyfin
syncPolicy:
automated:
selfHeal: true
prune: true
syncOptions:
- CreateNamespace=true

View File

@@ -1,16 +0,0 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- app.yaml
- qbittorent.yaml
helmCharts:
- name: jellyfin
repo: https://utkuozdemir.org/helm-charts
version: 2.0.0
releaseName: jellyfin
namespace: jellyfin
valuesFile: values.yaml
includeCRDs: true

View File

@@ -1,99 +0,0 @@
---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: vpn-creds
spec:
target:
name: vpn-creds
deletionPolicy: Delete
template:
type: Opaque
data:
ss_link: |-
{{ .ss_link }}
data:
- secretKey: ss_link
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: cfee6f62-fb06-4a4c-b6d8-92da4908c65a
property: fields[0].value
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: qbittorrent
labels:
app: qbittorrent
annotations:
reloader.stakater.com/auto: "true"
spec:
selector:
matchLabels:
app: qbittorrent
replicas: 1
strategy:
type: RollingUpdate
rollingUpdate:
maxSurge: 1
maxUnavailable: 0
template:
metadata:
labels:
app: qbittorrent
spec:
nodeSelector:
kubernetes.io/hostname: uk-desktop.tail2fe2d.ts.net
volumes:
- name: config
hostPath:
path: /k8s/qbt-config
type: DirectoryOrCreate
- name: media
hostPath:
path: /k8s/media/downloads
type: DirectoryOrCreate
containers:
- name: qbittorrent
image: 'linuxserver/qbittorrent:latest'
ports:
- name: http
containerPort: 8080
protocol: TCP
volumeMounts:
- name: config
mountPath: /config
- name: media
mountPath: /downloads
- name: shadowsocks-proxy
image: teddysun/shadowsocks-rust:latest
env:
- name: SS_LINK
valueFrom:
secretKeyRef:
name: vpn-creds
key: ss_link
command: ["/bin/bash", "-c", "rm /etc/shadowsocks-rust/config.json && sslocal --server-url $SS_LINK --local-addr 127.0.0.1:8081 -U --protocol http"]
resources:
requests:
memory: "64Mi"
cpu: "300m"
limits:
memory: "128Mi"
cpu: "300m"
---
apiVersion: v1
kind: Service
metadata:
name: qbittorrent
spec:
selector:
app: qbittorrent
ports:
- protocol: TCP
port: 80
targetPort: 8080

View File

@@ -1,39 +0,0 @@
image:
tag: 10.11.4
resources:
requests:
memory: "2Gi"
cpu: "1000m"
limits:
memory: "8Gi"
cpu: "6000m"
nodeSelector:
kubernetes.io/hostname: uk-desktop.tail2fe2d.ts.net
persistence:
config:
enabled: true
isPvc: false
customVolume:
hostPath:
path: /k8s/jellyfin
type: DirectoryOrCreate
data:
enabled: true
isPvc: false
customVolume:
hostPath:
path: /k8s/media/downloads
type: DirectoryOrCreate
ingress:
enabled: true
className: traefik
annotations:
cert-manager.io/cluster-issuer: letsencrypt
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
hosts:
- host: uk-desktop.uk
paths:
- path: /
pathType: Prefix

View File

@@ -1,18 +0,0 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: khm-client
namespace: argocd
spec:
project: desktop
destination:
namespace: khm
server: https://kubernetes.default.svc
source:
repoURL: ssh://git@gt.hexor.cy:30022/ab/homelab.git
targetRevision: HEAD
path: k8s/desktop/khm
syncPolicy:
automated:
selfHeal: true
prune: true

View File

@@ -1,33 +0,0 @@
---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: khm-client-creds
spec:
target:
name: khm-client-creds
deletionPolicy: Delete
template:
type: Opaque
data:
USERNAME: |-
{{ .username }}
PASSWORD: |-
{{ .password }}
data:
- secretKey: username
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: 19c06480-0814-4d1f-aa80-710105989188
property: login.username
- secretKey: password
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: 19c06480-0814-4d1f-aa80-710105989188
property: login.password

View File

@@ -1,69 +0,0 @@
---
apiVersion: batch/v1
kind: CronJob
metadata:
name: khm-client
labels:
app: khm-client
spec:
schedule: "15 * * * *"
concurrencyPolicy: Forbid
successfulJobsHistoryLimit: 3
failedJobsHistoryLimit: 3
jobTemplate:
spec:
template:
metadata:
labels:
app: khm-client
spec:
restartPolicy: OnFailure
hostNetwork: true
nodeSelector:
node-role.kubernetes.io/desktop: ""
tolerations:
- key: workload
operator: Equal
value: desktop
effect: NoSchedule
containers:
- name: khm-client
image: 'ultradesu/khm:latest'
imagePullPolicy: Always
securityContext:
privileged: false
resources:
requests:
memory: "64Mi"
cpu: "50m"
limits:
memory: "256Mi"
cpu: "200m"
command:
- /bin/sh
- -c
- |
/usr/local/bin/khm \
--known-hosts /host-ssh/known_hosts \
--host https://khm.hexor.cy \
--flow=private \
--basic-auth="${USERNAME}:${PASSWORD}" \
--in-place
env:
- name: USERNAME
valueFrom:
secretKeyRef:
name: khm-client-creds
key: USERNAME
- name: PASSWORD
valueFrom:
secretKeyRef:
name: khm-client-creds
key: PASSWORD
volumeMounts:
- name: known-hosts
mountPath: /host-ssh/known_hosts
volumes:
- name: known-hosts
hostPath:
path: /home/ab/.ssh/known_hosts

View File

@@ -1,6 +0,0 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- external-secrets.yaml
- khm-client-cronjob.yaml

View File

@@ -196,7 +196,6 @@ EOT
internal_host_ssl_validation = false
meta_description = ""
skip_path_regex = <<-EOT
/
/sub/
/dashboard/
/api/